![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
CF 2019: Alghero, Italy
- Francesca Palumbo, Michela Becchi, Martin Schulz, Kento Sato:
Proceedings of the 16th ACM International Conference on Computing Frontiers, CF 2019, Alghero, Italy, April 30 - May 2, 2019. ACM 2019, ISBN 978-1-4503-6685-4
Keynotes
- Catherine Graves:
High performance, power efficient hardware accelerators: emerging devices, circuits and architecture co-design. 1 - Danilo Pau:
Artificial intelligent sensors at the core of cyber-physical-systems: from theory to practical applications. 2
Machine Learning
- Fabian Boemer, Yixing Lao, Rosario Cammarota, Casimir Wierzynski:
nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data. 3-13 - Xuewen Cui
, Wu-chun Feng:
Iterative machine learning (IterML) for effective parameter pruning and tuning in accelerators. 16-23
Security
- Jianguo Jiang, Qiwen Wang, Zhixin Shi, Bin Lv, Wei Fan, Xiao Peng:
The parameter optimization based on LVPSO algorithm for detecting multi-step attacks. 24-31 - Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. 32-41 - Muhammad Ali Siddiqi
, Christos Strydis
:
Towards realistic battery-DoS protection of implantable medical devices. 42-49 - Francis B. Moreira, Daniel A. G. de Oliveira
, Philippe O. A. Navaux:
SPADA: a statistical program attack detection analysis. 50-58
Architectures
- Florian Neugebauer, Ilia Polian, John P. Hayes:
On the maximum function in stochastic computing. 59-66 - Swamit S. Tannu
, Poulami Das, Michael L. Lewis, Robert F. Krick, Douglas M. Carmean, Moinuddin K. Qureshi:
A case for superconducting accelerators. 67-75
Quantum computing
- Elijah Pelofske, Georg Hahn, Hristo N. Djidjev
:
Solving large minimum vertex cover problems on a quantum annealer. 76-84 - Jun Doi, Hitomi Takahashi, Rudy Raymond
, Takashi Imamichi, Hiroshi Horii:
Quantum computing simulator on a heterogenous HPC system. 85-93
Optimization and algorithms
- Marcelino Rodriguez-Cancio, Benoît Combemale, Benoit Baudry:
Approximate loop unrolling. 94-105 - Anastasiia Butko, George Michelogiannakis
, David Donofrio, John Shalf
:
TIGER: topology-aware task assignment approach using ising machines. 106-114 - Shuo Ji, Yinliang Zhao, Qing Yi:
Accelerating parallel graph computing with speculation. 115-124 - Kartik Lakhotia, Rajgopal Kannan, Aditya Gaur, Ajitesh Srivastava, Viktor K. Prasanna:
Parallel edge-based sampling for static and dynamic graphs. 125-134
Memory technologies
- Foteini Strati, Christina Giannoula, Dimitrios Siakavaras, Georgios I. Goumas, Nectarios Koziris:
An adaptive concurrent priority queue for NUMA architectures. 135-144 - Alexandre Chabot, Ihsen Alouani
, Smaïl Niar, Réda Nouacer:
A new memory reliability technique for multiple bit upsets mitigation. 145-152 - Christos Sakalis, Mehdi Alipour, Alberto Ros
, Alexandra Jimborean
, Stefanos Kaxiras, Magnus Själander:
Ghost loads: what is the cost of invisible speculation? 153-163
Programming systems and abstractions
- Matthew Sotoudeh
, Anand Venkat, Michael J. Anderson, Evangelos Georganas, Alexander Heinecke, Jason Knight:
ISA mapper: a compute and hardware agnostic deep learning compiler. 164-173 - Long Chen, Wei Ye, Shikun Zhang:
Capturing source code semantics via tree-based convolution over API-enhanced AST. 174-182
Machine Learning
- Yehya Nasser, Carlo Sau, Jean-Christophe Prévotet, Tiziana Fanni
, Francesca Palumbo
, Maryline Hélard, Luigi Raffo
:
NeuPow: artificial neural networks for power and behavioral modeling of arithmetic components in 45nm ASICs technology. 183-189 - Xingbin Wang
, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng:
NPUFort: a secure architecture of DNN accelerator against model inversion attack. 190-196 - Zhou Cheng, Tianmei Qi, Jixiang Wang, Yu Zhou, Zhihong Wang, Yi Guo, Junfeng Zhao:
Sentiment evaluation of forex news. 197-201 - Liang Ge, Aoli Zhou, Hang Li, Junling Liu:
Spatially fine-grained air quality prediction based on DBU-LSTM. 202-205
Security
- Swastika Dutta, Sayan Sinha:
Performance statistics and learning based detection of exploitative speculative attacks. 206-210 - Yixiang Wang, Jiqiang Liu, Xiaolin Chang:
Assessing transferability of adversarial examples against malware detection classifiers. 211-214
Architectures
- Marcel Brand, Michael Witterauf, Frank Hannig
, Jürgen Teich:
Anytime instructions for programmable accuracy floating-point arithmetic. 215-219
Quantum Computing
- Georgiy Krylov, Martin Lukac:
Quantum encoded quantum evolutionary algorithm for the design of quantum circuits. 220-225 - Daniel Vert, Renaud Sirdey
, Stéphane Louise:
On the limitations of the chimera graph topology in using analog quantum computers. 226-229 - Suvadip Batabyal
, Kounteya Sarkar
:
Realizing parallelism in quantum MISD architecture. 230-234
Mobile and edge computing
- Alessio Burrello
, Alex Marchioni
, Davide Brunelli
, Luca Benini
:
Embedding principal component analysis for data reduction in structural health monitoring on low-cost IoT gateways. 235-239 - Erick Lavoie, Laurie J. Hendren:
Personal volunteer computing. 240-246 - Syuan-Yi Lin, Chung-Ta King:
User-centered context-aware CPU/GPU power management for interactive applications on smartphones. 247-250
Memory technologies
- Wang Xu, Israel Koren:
Designing a secure DRAM+NVM hybrid memory module. 251-255 - Ivy Bo Peng
, Jeffrey S. Vetter, Shirley Moore, Joydeep Rakshit, Stefano Markidis:
Analyzing the suitability of contemporary 3D-stacked PIM architectures for HPC scientific applications. 256-262
Programming systems and abstractions
- Martin Surkovský
:
MP net as abstract model of communication for message-passing applications. 263-267 - Ruidong Gu, Michela Becchi:
A comparative study of parallel programming frameworks for distributed GPU applications. 268-273 - Cristobal Camarero, Carmen Martínez
, José Luis Bosque
:
Simulation with skeletons of applications using dimemas. 274-278 - Anne Hommelberg, Kristian F. D. Rietveld
, Harry A. G. Wijshoff:
Abstracting parallel program specification: a case study on k-means clustering. 279-282
Poster papers
- Muhammad Ali Siddiqi
, Christos Strydis
:
IMD security vs. energy: are we tilting at windmills?: POSTER. 283-285 - Zhou Cheng, Jixiang Wang, Tianmei Qi, Junfeng Zhao, Zhihong Wang, Yi Guo, Yu Zhou:
Will sentiment of forex news effect forecast of the RMB exchange rate?: POSTER. 286-288 - Daniel Madroñal, Tiziana Fanni
:
Run-time performance monitoring of hardware accelerators: POSTER. 289-291 - Daniele Cattaneo
, Antonio Di Bello, Michele Chiari
, Stefano Cherubin
, Giovanni Agosta:
Fixed point exploitation via compiler analyses and transformations: POSTER. 292-294 - Qingchang Han, Hailong Yang, Zhongzhi Luan, Depei Qian:
Accelerating tile low-rank GEMM on sunway architecture: POSTER. 295-297 - Emanuele Vitali, Davide Gadioli, Andrea Beccari, Carlo Cavazzoni, Cristina Silvano, Gianluca Palermo:
An hybrid approach to accelerate a molecular docking application for virtual screening in heterogeneous nodes: POSTER. 298-299 - G. A. Gillani, André B. J. Kokkeler:
Go green radio astronomy: Approximate Computing Perspective: Opportunities and Challenges: POSTER. 300-301 - Carsten Trinitis, Christina B. Class, Stefan Ullrich:
The german informatics society's new ethical guidelines: POSTER. 302-304 - Krista Rizman Zalik, Borut Zalik:
Using community detection for spatial networks: POSTER. 305-306
Special session on the data model convergence: Architecture
- John L. Gustafson:
Next-generation arithmetic: major performance gains with minimal disruption. 307 - John D. Leidel, Frank Conlon:
Toward a graph-based dependence analysis framework for high level design verification. 308-316 - Anastasiia Butko, George Michelogiannakis
, David Donofrio, John Shalf
:
Extending classical processors to support future large scale quantum accelerators. 317 - Alejandro Rico:
Scaling up performance of fat nodes for HPC. 318
Special invited session on EU projects
- Mario Kovac:
European processor initiative: the industrial cornerstone of EuroHPC for exascale era. 319 - Francesca Palumbo
, Tiziana Fanni
, Carlo Sau, Luca Pulina, Luigi Raffo
, Michael Masin, Evgeny Shindin
, Pablo Sanchez de Rojas, Karol Desnos, Maxime Pelcat, Alfonso Rodríguez, Eduardo Juárez
, Francesco Regazzoni
, Giuseppe Meloni, Katiuscia Zedda, Hans Myrhaug, Leszek Kaliciak, Joost Adriaanse, Julio de Oliveira Filho, Pablo Muñoz, Antonella Toffetti:
CERBERO: Cross-layer modEl-based fRamework for multi-oBjective dEsign of reconfigurable systems in unceRtain hybRid envirOnments: Invited paper: CERBERO teams from UniSS, UniCA, IBM Research, TASE, INSA-Rennes, UPM, USI, Abinsula, AmbieSense, TNO, S&T, CRF. 320-325 - Paolo Meloni, Daniela Loi, Paola Busia, Gianfranco Deriu, Andy D. Pimentel
, Dolly Sapra
, Todor P. Stefanov
, Svetlana Minakova, Francesco Conti, Luca Benini
, Maura Pintor
, Battista Biggio
, Bernhard Moser
, Natalia Shepeleva, Nikos Fragoulis, Ilias Theodorakopoulos
, Michael Masin, Francesca Palumbo
:
Optimization and deployment of CNNs at the edge: the ALOHA experience. 326-332 - Zaid Al-Ars, Twan Basten, Ad de Beer, Marc Geilen
, Dip Goswami, Pekka Jääskeläinen
, Jirí Kadlec, Marcos Martinez de Alejandro, Francesca Palumbo
, Geran Peeren, Luigi Pomante
, Frank van der Linden, Jukka Saarinen, Tero Säntti, Carlo Sau, Maria Katiuscia Zedda:
The FitOptiVis ECSEL project: highly efficient distributed embedded image/video processing in cyber-physical systems. 333-338 - Petar Radojkovic:
Towards resilient EU HPC systems: a blueprint. 339
Special session on the data model convergence: Co-design
- Alex Pothen
:
Parallel algorithms through approximation: graphs, data privacy and machine learning. 340 - Johannes Langguth:
PGAS for graph analytics: can one sided communications break the scalability barrier? 341 - Massimo Bernaschi, Alessandro Celestini, Stefano Guarino, Flavio Lombardi, Enrico Mastrostefano:
Analysing the tor web with high performance graph algorithms. 342 - Antonino Tumeo:
Data and model convergence: a case for software defined architectures. 343
5th workshop on design of low power embedded systems (LP-EMS19)
- Geneviève Ndour, Tiago Trevisan Jost, Anca Molnos, Yves Durand, Arnaud Tisserand:
Evaluation of variable bit-width units in a RISC-V processor for approximate computing. 344-349 - Matteo Antonio Scrugli, Daniela Loi, Luigi Raffo
, Paolo Meloni:
A runtime-adaptive cognitive IoT node for healthcare monitoring. 350-357 - G. A. Gillani, A. Krapukhin, André B. J. Kokkeler:
Energy-efficient approximate least squares accelerator: a case study of radio astronomy calibration processing. 358-365 - Crefeda Faviola Rodrigues
, Graham D. Riley, Mikel Luján:
Exploration of task-based scheduling for convolutional neural networks accelerators under memory constraints. 366-372
Malicious software and hardware in internet of things (MAL-IOT19)
- Yan Yan, Elisabeth Oswald:
Examining the practical side channel resilience of ARX-boxes. 373-379 - Samuel N. Eshun, Paolo Palmieri
:
A privacy-preserving protocol for indoor wi-fi localization. 380-385 - Niccolò Izzo
, Alessandro Barenghi
, Luca Breveglieri, Gerardo Pelosi
, Paolo Amato:
A secure and authenticated host-to-memory communication interface. 386-391 - Sebastian Wallat, Nils Albartus
, Steffen Becker
, Max Hoffmann
, Maik Ender
, Marc Fyrbiak, Adrian Drees, Sebastian Maaßen, Christof Paar:
Highway to HAL: open-sourcing the first extendable gate-level netlist reverse engineering framework. 392-397
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.